Solved

How to Identify Apple MacBook Application Network Traffic?

Posted on 2014-09-23
5
348 Views
Last Modified: 2014-09-29
Recently Apple release iOS 8 for the iPhone/iPad/iPod family of devices.

As a business we supervise our devices using a MacBook.

During this process Apple Configurator will automatically download and install the latest release of iOS software.

We currently have an application that is critical to our business and does not work with iOS 7.

I need to identify what traffic, ports, domains, ip's etc I need to block to prevent Apple Configurator from updating the iPods to the latest version.

What tools or commands can I use to get a list of network traffic eminating purely from a single process on an Apple Mac?
0
Comment
Question by:Terry Rogers
  • 3
  • 2
5 Comments
 
LVL 10

Expert Comment

by:Ganesh Kumar A
Comment Utility
Once a device is supervised, you can set Update iOS to "Never update device".  I just added another profile to an iPad 2 and it only added the profile.

An iOS update is forced when supervising a device, but once supervised, it doesn't need to be forced with each refresh. After they are supervised, they will stay on the version of iOS installed as long as the option in Configurator is not set to "when update is available".  That option is only selectable once the device has been supervised.

Ports used by apple : http://support.apple.com/kb/HT6175?viewlocale=en_US
0
 
LVL 1

Author Comment

by:Terry Rogers
Comment Utility
Thank you.

I was already aware of this option.

I however need to supervise a device without it updating to the latest iOS as this is not compatible with out app.
0
 
LVL 1

Accepted Solution

by:
Terry Rogers earned 0 total points
Comment Utility
I now have a work around.

I am able to use custom versions to specify the software version to use.
0
 
LVL 10

Assisted Solution

by:Ganesh Kumar A
Ganesh Kumar A earned 500 total points
Comment Utility
0
 
LVL 1

Author Closing Comment

by:Terry Rogers
Comment Utility
Custom versions has solved my problem, but it is also good to know how to block over the air updates.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Syslogd is a utility that traps and logs messages sent by running processes. It is configured with the syslog.conf file, which consists of lines containing a pair of fields: "the selector field which specifies the types of messages and priorities to…
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now